...Voting is a right that every citizen of the United States of America is entitled to as long as they are legally allowed to vote according to the constitution and as long as they are of legal voting age. Electronic voting machines can be both a pro and a con in my opinion. I will go ahead and start with the pros. a)Voters with dissabilities, such as poor vision can use the voice and audio systems in the machines for better voting aide. this is my opinion reduces the needed for many poll workers and hence savibg the country some money. And alos hand held devices for people that are not able to stand for the voting period. b)The machines are able to provide ballots in alot of different languages.The USA is populated with citizens from all over...
Words: 465 - Pages: 2
...The city should continue the use of paper ballots. Everyone should be able to access to their right to vote and say they circle or checked the one they believe is right. Would i trust a electronic voting machine? No i would not, reason too it can get hacked. It is not a secure idea to do. We all know there are always technical difficulties. "As recently as 2014, EVMs in Virginia were shut down during an election when dozens of voters reported that the machines had incorrectly recorded their votes." I would not like my votes to be validated incorectly. These are big issues because your votes may go in wrong and in reality everything goes the opposite way because of the technical difficulties. Yes, the electronic voting machines have multiple...
Words: 279 - Pages: 2
...This paper, copyright the IEEE, appears in IEEE Symposium on Security and Privacy 2004. IEEE Computer Society Press, May 2004. This paper previously appeared as Johns Hopkins University Information Security Institute Technical Report TR-2003-19, July 23, 2003. Analysis of an Electronic Voting System TADAYOSHI KOHNO∗ A DAM S TUBBLEFIELD† DAN S. WALLACH§ February 27, 2004 AVIEL D. RUBIN‡ Abstract With significant U.S. federal funds now available to replace outdated punch-card and mechanical voting systems, municipalities and states throughout the U.S. are adopting paperless electronic voting systems from a number of different vendors. We present a security analysis of the source code to one such machine used in a significant share of the market. Our analysis shows that this voting system is far below even the most minimal security standards applicable in other contexts. We identify several problems including unauthorized privilege escalation, incorrect use of cryptography, vulnerabilities to network threats, and poor software development processes. We show that voters, without any insider privileges, can cast unlimited votes without being detected by any mechanisms within the voting terminal software. Furthermore, we show that even the most serious of our outsider attacks could have been discovered and executed without access to the source code. In the face of such attacks, the usual worries about insider threats are not the only concerns; outsiders can do the damage. That...
Words: 12856 - Pages: 52
...Do Electronic Voting Machines Improve the Voting Process? The electronic voting machine embraces an electronic means of efficiently casting a vote and electronic means of accurately counting votes. Electronic voting machines, can also display election results and because of controversies associated with their operation audit trail, information can also be obtained. There are many types of electronic voting systems: paper based electronic voting system; which provides a paper ballot to be marked by hand but counted electronically. Pressing buttons or using a touch screen can operate a direct recording electronic voting machine either mechanically or electrically. This machine stores the voting data in a memory bank as a printed copy, and can transmit results to a central location. A public network voting machine uses electronic ballots, which can be transmitted from the polling place to a central location as they are cast or as a batch throughout the election process. Electronic voting machines can be made fully accessible for persons with disabilities, allowing them the freedom to vote without experiencing any hardships. Because ballot tallies are done at the close of polling stations, many of the men and women are tired leaving much room for error. According to United States General Accounting Office (2004), testimony provided to various government agencies with a research report on electronic voting systems performance attributes. The report provides a summary...
Words: 1420 - Pages: 6
...Original Question: What is the best way to manually count ballot papers in block vote (BV) systems? With first-past-the-post systems, one can easily pile the ballots for each candidate, and then tally the totals. Where there is more than one vote recorded on ballot papers, some kind of tallying system seems unavoidable. What techniques are used in counting block vote ballots elsewhere? Introduction “Vote counting is one of the most crucial stages in the election process. Failure to complete the count and transmit results in a quick, transparent and accurate manner can jeopardize public confidence in the elections and will directly affect whether candidates and political parties accept the final results.” (The ACE Encyclopedia) Block Voting (BV) belongs to the “family” of plurality / majority Electoral Systems (The other two big “families” being proportional, or mixed Electoral Systems) and is in fact a first-past-the-post (FPTP) system with the difference that it occurs in multi-member districts with voters having as many votes as there are positions to be filled. In a five-member constituency for example, the five candidates with the largest number of votes are elected, regardless of the actual percentage level of votes they receive. In BV systems, voters are usually free to vote for individual candidates regardless of party affiliation, but they are not entitled to cast the same vote more than once. Voters are also most often free to not use all the votes they are entitled...
Words: 1653 - Pages: 7
...Applying MESE processes to Improve Online E-Voting Prototype System with Paillier Threshold Cryptosystem Web Services Version 1.00 A project submitted to the Faculty of Graduate School, University of Colorado at Colorado Springs in Partial Fulfillment of the Requirements for the Degree of Master of Engineering in Software Engineering Department of Computer Science Prepared by Hakan Evecek CS701 Dr. Chow Spring 2007 This project for the Masters of Engineering in Software Engineer degree by Hakan Evecek has been approved for the Department of Computer Science By _______________________________________________________ Dr. C. Edward Chow, Chair _______________________________________________________ Dr. Richard Weiner _______________________________________________________ Dr. Xiaobo Zhou Date Table of Contents Online E-Voting System Project Documentation 4 Abstract 6 1. Introduction 7 2. E-Voting System Related Literature 9 2.1. Public Key Cryptography 9 2.2. Homomorphic Encryption 10 2.3. Zero Knowledge Proofs 10 2.4. Threshold Cryptography 10 2.5. Cryptographic Voting Protocol 11 2.6. Issues in secure e-voting system 12 2.7. Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) 13 2.8. Chinese Remainder Theorem (CRT) 14 3. Online E-Voting System Project Description 17 3.1. Paillier Threshold...
Words: 7163 - Pages: 29
...Shuntres L. Willis Global Mkt. 3420 Dr. George Nakos 19 November 2012 Diebold 1. Why do you think Diebold choose this mode of expanding internationally? What were the advantages and disadvantages of this arrangement? Diebold was able to use Philips first and then IBMs distributions systems and gained knowledge about international markets, and reputation. By the 1970s and 1980s the growth of the Diebold was driven by the rapid expectance of ATM in the USA. The company initiated to sell ATM machines in foreign markets in the 1980s. Diebold forged a distribution agreement with the large Dutch multinational company Philips. With this agreement, Diebold manufactured ATMs in the United States and exported them to foreign customers after Philips had made the sale. Therefore, the company selects the entry mode of exporting which is usually the first step for a firm which intend expanded internationally. The advantage is a foreign consumer could trust IBM more easily than a brand of which it never heard of, and the disadvantage were that Diebold could not control the attention its products received from Philips and IBM. 2. What do you think prompted Diebold to alter its international expansion strategy in 1997 and start setting up wholly owned subsidiaries in most markets? Why do you think the company favored acquisitions as an entry mode? Diebold faced a saturated domestic market and increasing foreign demand, especially in developing countries like China, India and...
Words: 701 - Pages: 3
...Hacking: Understanding It All John Williams INF 103: Computer Literacy Thomas Hennefer June 14, 2010 Abstract As technology has grown, so has the dependence of society on its role in everyday life. Like many things, this dependence on technology comes at a risk. Hacking is the risk that members of society must face. Hackers can find any information they wish to acquire, which puts information, such as finances and personal, at great risk. In order to understand how to prevent hacking, one must first understand what is at risk to be hacked and the way in which the act is done. Technology has become a constant part of every day life. People now manage their bank accounts, pay bills, deal with highly confidential information, and even personal information online. All these aspects of technology in daily life are a temptation to others throughout the internet. Those who find themselves tempted perform the task of hacking, which leaves others and their personal information vulnerable. This paper will discuss society’s reliance of technology in all aspects of life; thereby, leaving personal information vulnerable. Also being discussed will be information hackers find tempting, the steps that some take to hack into systems allowing them access to normally unavailable information and the steps that can be used to help prevent hacking from occurring. Method In the task of preventing hackers from gaining access to information that could be harmful to the individual, you must...
Words: 2876 - Pages: 12
...CHAPTER 2 FOREIGN LITERATURE “Electronic Voting Literature” Voting on the internet using PC's everyday offers only weak security, but its main disadvantages are in the areas of anonymity and protection against coercion and/or vote selling. The Presidential elections of 2000 brought national attention to problems with current American methods of casting and counting votes in public elections. Most people believe that the current system should be changed; there is much disagreement on how such changes should be made. Dr. Michael Shamos of CMU provides a sharp counterpoint [6] to Neumann and Mercuri's views. While his “Six Commandments” summary of requirements for a voting system is very similar to others' requirements, he's less afraid of the catastrophic failures and sweeping fraud made possible by imperfections in electronic voting machines actually occurring in a real election. Shamos is also much less impressed with paper ballots than are Neumann and Mercuri. He places a great deal of faith in decentralization to make fraud difficult to commit and easy to detect. Dr. Shamos even likes DRE machines. (We must take into account the fact that this paper was written ten years ago, long before the 2000 elections and before more modern mathematical results like Chaum's; some of Dr. Shamos' opinions may have changed since then. While Dr. Neumann's talk cited here is of similar age, his pessimism with regard to machines has had little reason for change.) Rebecca Mercuri invented...
Words: 1446 - Pages: 6
...Both letters suggest whether or not electronic voting machines should be used. The author of "Everyone Should Be Able to Vote" says that it would be easier if people used electronic voting machines. But, the author of "Electronic Voting Is a Bad Idea" says that the machine can be hacked and people dont like using electronic voting machines. I personally agree with the auther of "Electonic Voting Is a Bad Idea" because in paragragh 1, sentence 5 it says, "In 2007, it was found that malicious software can transfer EVM votes for one candidate to another without the voter noticing." If the machines can be tampered with than its not a smart decision to vote with the EVM. Another reason i agree with this author is because it says that states need...
Words: 254 - Pages: 2
...1 Chapter 1 THE PROBLEM AND ITS SCOPE Introduction Now more than ever, technology is changing on how we vote. Voting schemes have evolved from counting hands on early days to systems that includes papers, punch cards, mechanical levers and optical machines. Electronic voting systems provide some characteristic different from the traditional voting technique. As an effect of vast change in modern technology, several techniques in voting arises in order to solve various drawbacks like time consuming and large volume of paper works can be consumed. So the solutions are televoting, android phone voting and web voting. Televoting was also known as voting via SMS text messages. Mobile phone connects through GSM (Global System for Mobile Communications) in which it searches for cells in the immediate vicinity. Televoting uses a format in which the public viewer follows and replies error whenever they send an invalid format. Like in a real television shows, televoting was a very common method that opens the public to vote its favorite contestant to remain and not to be evicted. The outcome will be decided by the number of votes in which a contestant garners. On the other hand, android phone voting and web voting has this similarity. Both use an internet in order to gain access and make vote counts. In web voting, it uses a browser to view the page and users just simply browse, follow some steps and vote, and if successful, the vote is counted. The most common method before a user...
Words: 3624 - Pages: 15
...these machines and why i do/dont like them. To begin, i will proceed with my explanation of why i believe EVM's would be a important asset to the voting community. It is my belief that with EVM's it would be entirely easier for those with disabilitys. The ability to comprehend on the elctronic level has become way more advanced in the current millenium. Although it is still a machine, the EVM is advanced in Most foreign languages, making it much easier for immagrants to vote and better understand what they will be voting for. In excess, i believe it would eliminate the time it takes to sort through and process votes by hand, and the resources and people it takes to do so. Imagine the man power that will be...
Words: 436 - Pages: 2
...Rationale: Electronic Voting for Global Vote for Rights by Children International – Tabaco is joining at the World Children’s Prize. It is an education program for all children. Their goal is to become more humane world, where children’s rights are respected by all. And there will be a new way of voting and to make voting process faster and easier. More than 2000 youth ages 12 – 18 yrs. Old are going to vote, first they will have their registration of the participant, next followed by voting process by Electronic Voting, in this way we are going to minimize and lessen the step by step process of voting. Objective of the Study: In this proposal I would like to make the voting process easier, also all the youth can vote in a specific date, minimize the time and lessen the step by step process. First the youths need to register to know how many youth participate in the activity. Next they are going to have their line for the voting. There are 11 computers available to use in voting. The facilitators are going to assist and help to become the voting process is organize, after they vote facilitator put an indelible ink to their fingertip so recognize whose already voted. And lastly the voter can go home. Specific Objective: * To have a new process of voting by means of electronic voting. * To help the staff and facilitator to make the voting process easier and faster. * To open the mind and give the youth an idea to the new way of voting by means of electronic voting. ...
Words: 1220 - Pages: 5
...2.4 LOCAL LITERATURE 2.4.1 Electronic Voting Literature Review Computer scientists who have done work in, or are interested in, electronic voting all seem to agree on two things: * Internet voting does not meet the requirements for public elections * Currently widely-deployed voting systems need improvement Voting on the Internet using every day PC's offers only weak security, but its main disadvantages are in the areas of anonymity and protection against coercion and/or vote selling. It's such a truly bad idea that there seems to be no credible academic effort to deploy it at all. The Presidential elections of 2000 brought national attention to problems with current American methods of casting and counting votes in public elections. Most people believe that the current system should be changed; there is much disagreement on how such changes should be made. The MIT/Caltech researchers [1] “see a promising future for electronic voting, despite its problems today” (under a few conditions). They advocate using the methods currently in use which result in the lowest average numbers of “uncounted, unmarked, and spoiled ballots,” like in-precinct optical scanning. Their report even proposes a framework for new voting system with a decentralized, modular design. Other researchers have done work in electronic voting; while they may not explicitly mention voting from remote poll sites, their work is nonetheless relevant to any effort at designing or implementing...
Words: 4590 - Pages: 19
...An election is a formal decision-making process by which a population chooses an individual to hold public office.[1] Elections have been the usual mechanism by which modern representative democracy has operated since the 17th century.[1] Elections may fill offices in the legislature, sometimes in the executive and judiciary, and for regional and local government. This process is also used in many other private and business organizations, from clubs to voluntary associations and corporations....Election is the real participation of people in democracy, where the people participate in direct way to form in government. Election is not only a process where people go on cast his vote, though it is a festival of democracy system. Democracy depend on people, people depend on election there they elected his representative to parliament or government. Government needs to go with election for taking fresh memorandum through people of his country. Election shows the country is rule by the people of that country. Whenever government need for a fresh new term of his government they will go for election. Election is a power of government also a power of people. The dominance of the Indian National Congress was broken for the first time in 1977, with the defeat of the party led by Indira Gandhi, by an unlikely coalition of all the major other parties, which protested against the imposition of a controversial Emergency from 1975–1977. A similar coalition, led by VP Singh was swept to power...
Words: 2094 - Pages: 9